CyberSecurity Malaysia Flags Major Threats in Chrome and WordPress – Are You Safe?
Google Chrome and WordPress users face high-severity security threats. CyberSecurity Malaysia advises immediate updates to prevent potential exploits and safeguard data.
Overview
CyberSecurity Malaysia has recently notified users of critical vulnerabilities in two widely used software platforms: Google Chrome and the WordPress File Upload plugin. If exploited, these vulnerabilities could allow attackers to execute arbitrary code, escalate privileges, or cause disruptions.
Security updates have been issued, and users are strongly advised to apply these updates immediately to protect their systems.
This article provides an in-depth look at these vulnerabilities, their potential impacts, affected products, and recommended mitigation actions.
Google Chrome Security Update
Google has released security updates to address multiple vulnerabilities in the Chrome browser. These vulnerabilities have been categorized as high-severity risks and require immediate attention from users and administrators.
If successfully exploited, these vulnerabilities could enable attackers to:
- Execute arbitrary code on the target system.
- Escalate their privileges to gain unauthorized access.
- Cause denial-of-service (DoS) attacks on affected ChromeOS devices.
These threats underscore the importance of keeping software updated to prevent exploitation.
One of the critical vulnerabilities addressed in this update is:
- CVE-2025-0291 (High): This is a Type Confusion vulnerability in the V8 JavaScript engine. Type Confusion occurs when the program allocates or uses a resource in an unintended way, which could allow attackers to manipulate the system and execute malicious code.
Recommendations
CyberSecurity Malaysia advises all users and administrators to:
- Review the latest Google Chrome release notes.
- Update Chrome to the latest version without delay.
- Regularly check for updates to ensure their browser remains secure.
WordPress File Upload Plugin Vulnerability
WordPress has issued a critical security update to address a vulnerability in its File Upload plugin. This vulnerability, if exploited, could have severe consequences for WordPress websites, particularly those using outdated versions of the plugin.
The vulnerability could allow unauthenticated attackers to:
- Execute remote code on the server.
- Read arbitrary files, potentially exposing sensitive information.
- Delete files, causing data loss and service disruptions.
With a high severity score of 9.8 on the CVSS scale, this vulnerability is categorized as critical and poses a significant threat to websites using the affected plugin.
Affected Products
- WordPress File Upload Plugin: Versions 4.24.15 and below are affected.
- Vulnerability Details:
- CVE Identifier: CVE-2024-11613
- Vulnerability Type: Improper Control of Code Generation (Code Injection).
- Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Researcher: Abrahack
- Date of Public Disclosure: January 7, 2025
The vulnerability lies in the improper sanitization of the source parameter within the file wfu_file_downloader.php, which allows attackers to define their own directory paths. This flaw enables remote code execution, arbitrary file reading, and file deletion.
Recommendations
To protect their websites, CyberSecurity Malaysia urges WordPress users and administrators to:
- Update the WordPress File Upload Plugin: Install version 4.25.0 or any newer patched version.
- Regularly Monitor Plugin Updates: Ensure plugins are always up to date to prevent vulnerabilities.
- Review the Official Wordfence Security Updates: Follow detailed guidance provided by WordPress security teams.
Patched versions can be found on the WordPress.org plugin page.
Key Takeaways
- Act Quickly: The vulnerabilities in Google Chrome and WordPress File Upload plugin can lead to severe consequences, including unauthorized access, data breaches, and service disruptions. Immediate action is necessary to mitigate risks.
- Stay Updated: Regularly updating software, browsers, and plugins is one of the most effective ways to defend against cyber threats.
- Follow Trusted Sources: Always rely on credible sources such as Google, WordPress, and CyberSecurity Malaysia for updates and advisories.
- Educate Yourself and Your Team: Awareness of such vulnerabilities and their potential impacts can help individuals and organizations build a proactive security posture.
Conclusion
Both Google and WordPress have acted swiftly to address these vulnerabilities, and now it’s up to users to ensure their systems and websites are secure. CyberSecurity Malaysia’s advisories serve as a crucial reminder of the need for consistent software updates and security monitoring.
By taking timely action, users and administrators can safeguard their digital assets and minimize the risk of exploitation.
Stay updated, stay protected!
Source:
- https://www.mycert.org.my/portal/advisory?id=MA-1233.012025
- https://www.mycert.org.my/portal/advisory?id=MA-1231.012025
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/wp-file-upload/wordpress-file-upload-42415-unauthenticated-remote-code-execution-arbitrary-file-read-and-arbitrary-file-deletion
- https://chromereleases.googleblog.com/
The post CyberSecurity Malaysia Flags Major Threats in Chrome and WordPress – Are You Safe? appeared first on Cyble.
Blog – Cyble – Read More